Most Helpful Girl

Most Helpful Guy

proxy, mirroring, virtualizing. take a linux system, install intrusion detection, run virtualbox, load install image of windows that is running gag, make backups of the windows virtual machine. then make linux do all the heavy lifting for network security. most "hackers" are your friends that know your pass codes to logins, or lax security procedures.